bigstockphoto_Security_Pad_Locks_40080.jpg

Ed Felten, Alex Halderman, and Ari Feldman last fall proved that Diebold’s electronic election machines were susceptible to being infected with malicious, vote-altering software. In their now-famous video, they also demonstrated that the lock to the machine’s memory card door was easily picked.

But why pick the lock when you can make a duplicate, asks Ross Kinard at SploitCast? Kinard sent Halderman three keys that he made at home with a drill, by following a photograph of the keys that Diebold featured on its website.

Halderman reports that two of the three homemade keys open the Diebold machine that the Princeton trio has in its possession.

Read more and see a video of Kinard’s key-manufacturing technique on Freedom to Tinker. Bradblog also offers a report.

 
css.php